Sciweavers

2956 search results - page 467 / 592
» Databases and Higher Types
Sort
View
ASIACRYPT
2008
Springer
15 years 2 days ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
ATAL
2008
Springer
15 years 2 days ago
Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games
In a class of games known as Stackelberg games, one agent (the leader) must commit to a strategy that can be observed by the other agent (the follower or adversary) before the adv...
Praveen Paruchuri, Jonathan P. Pearce, Janusz Mare...
ACL
2008
14 years 11 months ago
The Tradeoffs Between Open and Traditional Relation Extraction
Traditional Information Extraction (IE) takes a relation name and hand-tagged examples of that relation as input. Open IE is a relationindependent extraction paradigm that is tail...
Michele Banko, Oren Etzioni
IJCAI
2007
14 years 11 months ago
Spiteful Bidding in Sealed-Bid Auctions
We study the bidding behavior of spiteful agents who, contrary to the common assumption of selfinterest, maximize a convex combination of their own profit and their competitorsā€...
Felix Brandt, Tuomas Sandholm, Yoav Shoham
MKWI
2008
206views Business» more  MKWI 2008»
14 years 11 months ago
Service-Oriented Architecture: Introducing a Query Language
: Language offers human beings the ability to exchange information. Whether the information is understood or not depends on the structure, complexity and knowledge of the language....
Sebastian Günther, Claus Rautenstrauch, Niko ...